CLOUDCYBERSAFE Examples

InfoSec Solutions, Thoughts and Innovation
We talk about Cloud Security Data Analysis CyberSecurity
What’s in an index?
Splunk Enterprise stores all of the data it processes in indexes. An index is a collection of databases, which are
Read more.
The EU General Data Protection Regulation (GDPR)
The EU General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation
Read more.
How to estimate Splunk storage size
Daily logs GB After compression and TSIDX creation your data will be 75% of its original size Data Retention number
Read more.
Cloud Security Terms
The CCSP is a global credential that represents the highest standard for cloud security expertise. It was co-created by (ISC)²
Read more.
Architecting Splunk Deployment
Architecting Splunk Deployment Scale Splunk Enterprise functionality to handle the data needs for enterprises of any size and complexity. Access
Read more.
Characteristics of IaaS, PaaS and SaaS
IaaS Characteristics Scale Converged network and IT capacity pool Self-service and on-demand capacity High reliability and resilience IaaS key Benefits
Read more.
How to configure Splunk Multi site Indexer Cluster
Deploy a multisite indexer cluster To deploy a multisite cluster, you configure the set of nodes for each site: A
Read more.
USB Storage Device Monitoring using ELK
USB storage devices are commonly used in almost all organizations to store or transfer data. These devices act as the
Read more.
Splunk deployment server configuration
Deployment Server is for distributing configuration, and apps to Splunk Universal Forwarder, and allows you to manage remote Splunk forwarder
Read more.
Logstash GROK Filter
Grok is a filter used by Logstash to parse unstructured data to structured format which is queryable by elasticsearch. Logstash
Read more.
Cloud Benefits
Private Cloud Benefits Increased control over data, underlying systems, and application Ownership and retention of governance controls. Assurance over data
Read more.
Basic Security Considerations for Cloud
Knowledge of the computer hardware and physical IT infrastructure are important elements of information security.    One must understand where
Read more.
PHP-LDAP Authentication for Single Sign-On
Implementation of LDAP-Authentication using php and OpenLDAP library which can be used for authentication of Active directory users in php
Read more.
Splunk Universal forwarder on Linux
Universal forwarder on Linux Splunk universal forwarder is a best and performance reliable method to forward logs to an indexer
Read more.
ELK Stack installation on CENTOS using YUM
ELK is the acronym for three open source projects: Elasticsearch, Logstash, and Kibana. Elasticsearch is a search and analytics engine
Read more.
The Splunk search processing language
Searches are made up of this basic components   Search terms – what are you looking for? -keywords, phrases, Booleans, etc.
Read more.